Penetration Testing mailing list archives

Extreme Networks password hash


From: Alexander Sandström Krantz A <alexander.a.sandstrom.krantz () ericsson com>
Date: Thu, 17 Apr 2008 15:32:41 +0200

Hi!
I'm interested in finding out what kind of hash Extremeware (v 7.7) uses to
encrypt user passwords. The reason is that I'm trying to find out how to
perform a (dictionary or bruteforce) password attack against an Extreme
Networks switch. I could use Medusa or THC-Hydra to perform a remote attack,
but I would like to avoid it if it's not necessary because of the performance
drawbacks.

I've read through the documentation provided by Extreme, but found nothing. I
know that to set up the admin account with an empty password, and create an
account "user", also with an empty password, the following configuration is
used:

--------------------------------------- 
configure account admin encrypted
452tVo$nEbHpfJFTUGyBrqmtY8q3.
452tVo$nEbHpfJFTUGyBrqmtY8q3.
create account user "user" encrypted "yN/tVo$ARBcY8KlQBq.lvJg2nc5F."
-------------------------------------- 

As these commands contain different hashes, even though both users are given
emtpy passwords, I guess the hash is salted. From the length I also guess that
it's SHA224, but that is a complete guess as I really have no idea.

Does anyone know about the kind of hash used, or recognize the ones in the
configuration? If you do, would you happen to know any tool that can perform
an attack against this kind of hash?

Cheers,
Alexander

Attachment: smime.p7s
Description:


Current thread: